Steganography in Filesystem Metadata

Total Page:16

File Type:pdf, Size:1020Kb

Steganography in Filesystem Metadata Digital Investigation 18 (2016) S76eS86 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS USA 2016 d Proceedings of the 16th Annual USA Digital Forensics Research Conference Time is on my side: Steganography in filesystem metadata * Sebastian Neuner a, , Artemios G. Voyiatzis a, Martin Schmiedecker a, Stefan Brunthaler a, Stefan Katzenbeisser b, Edgar R. Weippl a a SBA Research, Vienna, Austria b Technische Universitat€ Darmstadt, Germany abstract Keywords: We propose and explore the applicability of file timestamps as a steganographic channel. Digital forensics We identify an information gap between storage and usage of timestamps in modern Data hiding operating systems that use high-precision timers. Building on this, we describe a layered Steganography design of a steganographic system that offers stealthiness, robustness, and wide applica- Storage forensics bility. The proposed design is evaluated through theoretical, evidence-based, and experi- File system forensics fi Real-world data corpus mental analysis for the case of NTFS using datasets comprising millions of les. We report a proof-of-concept implementation and confirm that the embedded information is indis- tinguishable from that of a normal filesystem use. Finally, we discuss the digital forensics analysis implications of this new information-hiding technique. © 2016 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Introduction strategic corporate information during transmission (Cox et al., 2007). The need for protected information exchange and stor- Numerous steganographic techniques have been pro- age in the digital world is constantly increasing. Crypto- posed and analyzed in the research literature (Zielinska graphic techniques can provide information confidentiality, et al., 2014). The analysis focuses on criteria such as the authenticity, and integrity. However, they do leave evi- achieved secrecy on specific application scenarios, the dence of the information exchange. steganographic channel capacity, and the information Steganographic techniques are able to hide the exis- channel utilization. tence of information passing through communication Storage or format-oriented steganographic techniques channels or resting in storage media for later access. These hide information in logical channels by utilizing redundant techniques are useful in a wide range of real-world sce- or unused fields in format specifications. This includes, narios, including but not limited to: circumventing among others, the master boot record (MBR) of non- censorship and restrictions imposed by governments and bootable hard disks and the unused disk space caused by other adversaries (Akgül and Kırlıdog; Anderson, 2012), the misalignment of hard disk sector size and file size assisting whistleblowers when disclosing documents (Khan et al., 2011). (Greenwald, 2014), and supporting businesses to protect Modern filesystems support a wealth of operations that span beyond the primitive of mapping files into sequences of hard disk sectors. The filesystem specifications define additional data structures (i.e., “metadata”) to describe in- * Corresponding author. formation like the owner, the access permissions, and the E-mail addresses: [email protected] (S. Neuner), avoyiatzis@ date and time when important file events took place. sba-research.org (A.G. Voyiatzis), [email protected] (M. Schmiedecker), [email protected] (S. Brunthaler), In this paper, we propose and explore, to the best of our [email protected] (S. Katzenbeisser), knowledge for the first time in literature, the applicability [email protected] (E.R. Weippl). http://dx.doi.org/10.1016/j.diin.2016.04.010 1742-2876/© 2016 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/). S. Neuner et al. / Digital Investigation 18 (2016) S76eS86 S77 of filesystem timestamps as a steganographic channel. More steganographic protocols are feasible, we are still lacking specifically, we make the following contributions: functional implementations and widespread use of such tools (Hopper et al., 2009). 1. We analyze the granularity of the timestamps that A second line of research focused on embedding unob- modern filesystems implement, and we evaluate their servable information within the contents of stored files, applicability for steganographic applications. introducing undetectable degradation of multimedia 2. We propose the use of timestamps as a means to hide quality (e.g., manipulating the low-significance bits of pixel information in NTFS and other filesystems with sub- representation in images (Bailey and Curran, 2006)), the second timestamp granularity. color palettes in GIF images (Fridrich and Du, 2000), or 3. We describe a system design and a proof-of-concept (possibly) encoding information in YouTube videos that implementation that support different levels of look like static snow (Williams, 2015). possible capacity to securely hide data on NTFS volumes. 4. We validate the proposed system using real-world and Filesystems synthetic datasets, and we show that the embedded steganographic information cannot be distinguished A plethora of different filesystems is available, including from the information produced by normal filesystem FAT and NTFS for Microsoft-Windows-based devices, ext4 operations. and btrfs for GNU/Linux systems, and HFSþ for Apple OS X 5. We discuss the digital forensics implications of this new and iOS devices.1 Most of them store different artefacts at steganographic method. various levels of granularity and detail, collectively known as “filesystem metadata”. The rest of this paper is organized as follows: Section Filesystem metadata can be classified in five categories: (Background) provides a literature review on steganog- file system, application, file name, content, and generic met- raphy with emphasis on storage artefacts. Section adata (Carrier, 2005). File system metadata are information (Timestamps in modern filesystems) analyzes the use of on how the filesystem is to be read and where the impor- timestamps on modern filesystems. Section tant data structures reside. Application metadata are in- (Steganography based on file timestamps) proposes a novel formation useful for the application utilizing the filesystem, steganographic channel based on file timestamps. Section such as the file owner and the file access permissions. File (Evaluation of the TOMS system) evaluates the security of name metadata are information for the human-readable the proposed system. Section (Experimental system names mapping to logical data locations. Content meta- validation) describes a proof-of-concept implementation data are information about the logical addressing of the aiming at NTFS filesystems. Section (Implications for files, the file allocation status, and the actual data of the forensics analysis) discusses the implications on the digi- files. Generic metadata are information mostly used inter- tal forensics process. Finally, Section (Conclusions and nally by the filesystem for its operations. This includes in- future work) concludes the paper and presents the future formation such as the timestamps of various events in the directions of our work. lifecycle of a file. Steganography using filesystem metadata Background The topic of hiding data in filesystem metadata was Data hiding heavily discussed in the late 1990s (Anderson et al., 1998). Back then, export restrictions on the use of strong crypto- Early works on digital steganography focused on hiding graphic algorithms outside the USA were in place, and there data in the clear, deriving and discussing different methods was an increased concern by the public regarding key of embedding data, and arguing how steganography is and escrow. StegFS, a steganographic filesystem compatible probably will be used in the present and in the near future with the Linux ext2 filesystem, was developed (McDonald (Katzenbeisser and Petitcolas, 2000; Zielinska et al., 2014). and Kuhn, 2000; Pang et al., 2003). This filesystem ach- Such works did not anticipate the widespread use of the ieved plausible deniability of the hidden content thanks to personal digital devices and the role of the Internet in our its indistinguishability from unused content. This behavior daily lives (Franz et al., 1996; Anderson and Petitcolas, was achieved by applying encryption on the content under 1998). the assumption that a good encryption algorithm ensures A considerable amount of research was devoted to that encrypted data appear as random data. However, the embedding unobservable communication within normal use of StegFS is not undetectable as the needed filesystem fi network traf c, ranging from the utilization of TCP/IP driver is not hidden. Additionally, there is no integrity fi timestamps (Gif n et al., 2003) to the more general usage check of the data. Thus, StegFS cannot recover from any fi of TCP/IP elds (Murdoch and Lewis, 2005). Many imple- kind of intrusive data modifications. mentations of steganography hide encrypted data in Encoding (hiding) information in the order that a fil- fi innocent-looking network traf c (e.g., ptunnel (Stodle)), esystem indexes the file names is explored in (Aycock and header fields (Rutkowska, 2004), or use timing intervals and artificial transmission delays for information trans-
Recommended publications
  • Can Self-Censorship in News Media Be Detected Algorithmically? A
    Can Self-Censorship in News Media be Detected Algorithmically? A Case Study in Latin America Rongrong Tao1, Baojian Zhou2, Feng Chen2, Naifeng Liu2, David Mares3, Patrick Butler1, Naren Ramakrishnan1 1 Discovery Analytics Center, Department of Computer Science, Virginia Tech, Arlington, VA, USA 2 Department of Computer Science, University at Albany, SUNY, Albany, NY, USA 3 University of California at San Diego, San Diego, CA, USA [email protected], {bzhou6, fchen5, nliu3}@albany.edu, [email protected] [email protected], [email protected] Abstract Censorship in social media has been well studied and pro- vides insight into how governments stifle freedom of expres- sion online. Comparatively less (or no) attention has been paid to detecting (self) censorship in traditional media (e.g., news) using social media as a bellweather. We present a novel unsupervised approach that views social media as a sensor to detect censorship in news media wherein statisti- cally significant differences between information published in the news media and the correlated information published in social media are automatically identified as candidate cen- Figure 1: Worldwide freedom of the press (2014). The higher the sored events. We develop a hypothesis testing framework score, the worse the press freedom status. to identify and evaluate censored clusters of keywords, and a new near-linear-time algorithm (called GraphDPD) to identify the highest scoring clusters as indicators of censor- Social media censorship often takes the form of active cen- ship. We outline extensive experiments on semi-synthetic sors identifying offending posts and deleting them and there- data as well as real datasets (with Twitter and local news fore tracking post deletions supports the use of supervised media) from Mexico and Venezuela, highlighting the capa- learning approaches [8, 4, 1, 11].
    [Show full text]
  • Media Literacy Policy in Pakistan
    Hacettepe University Graduate School of Social Sciences Department of Communication Sciences MEDIA LITERACY POLICY IN PAKISTAN Sana ZAINAB Master Thesis Ankara, 2019 MEDIA LITERACY POLICY IN PAKISTAN Sana ZAINAB Hacettepe University Graduate School of Social Sciences Department of Communication Sciences Master Thesis Ankara, 2019 YAYIMLAMA VE FİKRİ MÜLKİYET HAKLARI BEYANI Enstitü tarafından onaylanan lisansüstü tezimin tamamını veya herhangi bir kısmını, basılı (kağıt) ve elektronik formatta arşivleme ve aşağıda verilen koşullarla kullanıma açma iznini Hacettepe Üniversitesine verdiğimi bildiririm. Bu izinle Üniversiteye verilen kullanım hakları dışındaki tüm fikri mülkiyet haklarım bende kalacak, tezimin tamamının ya da bir bölümünün gelecekteki çalışmalarda (makale, kitap, lisans ve patent vb.) kullanım hakları bana ait olacaktır. Tezin kendi orijinal çalışmam olduğunu, başkalarının haklarını ihlal etmediğimi ve tezimin tek yetkili sahibi olduğumu beyan ve taahhüt ederim. Tezimde yer alan telif hakkı bulunan ve sahiplerinden yazılı izin alınarak kullanılması zorunlu metinleri yazılı izin alınarak kullandığımı ve istenildiğinde suretlerini Üniversiteye teslim etmeyi taahhüt ederim. Yükseköğretim Kurulu tarafından yayınlanan “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” kapsamında tezim aşağıda belirtilen koşullar haricince YÖK Ulusal Tez Merkezi / H.Ü. Kütüphaneleri Açık Erişim Sisteminde erişime açılır. o Enstitü / Fakülte yönetim kurulu kararı ile tezimin erişime açılması mezuniyet
    [Show full text]
  • CHRIS BRONK, Ph.D. 4403 Oak Forest Dr. Missouri City, TX 77459 W
    CHRIS BRONK, Ph.D. 4403 Oak Forest Dr. Missouri City, TX 77459 W: 713.743.5593 C: 832.729.6205 rcbronk <at> central.uh.edu http://www.uh.edu/technology/departments/ilt/people/faculty/?l=bronk&f=chris PROFESSIONAL EXPERIENCE UNIVERSITY OF HOUSTON, Houston, TX Associate Professor, Information Sciences Technology 2020 – Present Assistant Professor, Information & Logistics Technology 2014 – 2020 Program Coordinator, Cybersecurity 2021 – Present Associate Director, Center for Information Security Research and Education 2014 – Present Research Associate, Hobby School of Public Affairs 2018 – Present RICE UNIVERSITY, Houston, TX Director – Program on Energy and Cybersecurity, Center for Energy Studies 2013 – 2014 Fellow – Baker Institute for Public Policy 2006 – 2014 Adjunct Associate Professor – Department of Computer Science 2011 – Present Lecturer – Department of Computer Science 2007 – 2011 UNIVERSITY OF TORONTO, Toronto, ONT Senior Fellow in Cyber Geopolitics – Canada Ctr. for Security Studies 2012 – 2014 SYRACUSE UNIVERSITY, Syracuse, NY Senior Research Fellow – Dept. of Electrical & Computer Engineering 2010 U.S. DEPARTMENT OF STATE, Washington, D.C. Senior Advisor – Office of eDiplomacy 2009 – 2015 Foreign Service Officer 2002 – 2007 SYRACUSE LANGUAGE SYSTEMS, Syracuse, NY Technical Staff Coordinator/Software Developer 1995 – 2000 EDUCATION SYRACUSE UNIVERSITY MAXWELL SCHOOL, Syracuse, NY Ph.D. in Political Science, 2006 * Dissertation: In Confidence: Information Technology, Secrecy and the State. * Subfields: International Relations and Public Administration MA in Political Science, 2001 YONSEI UNIVERSITY, Seoul, S. Korea Coursework in Asian Studies and Korean, 2001 – 2002 UNIVERSITY OF WISCONSIN, Madison, WI BS in History, with distinction, 1995 OXFORD UNIVERSITY, Oxford, UK Coursework in International Politics and History, 1992 HONORS UNIVERSITY OF HOUSTON • College of Technology Faculty Award.
    [Show full text]
  • End of News:Internet Censorship in Turkey
    https://www.freewebturkey.com/end-of-news End of news: Internet censorship in Turkey This report was published as part of the Free Web Turkey project carried out by the Media and Law Studies Association between November 2019 and October 2020. http://www.freewebturkey.com | http://www.mlsaturkey.com About MLSA and Free Web Turkey The Media and Law Studies Association (MLSA) was founded in 2017 and its main field of activity is of- fering legal protection to journalists and people tried in freedom of expression cases. As the MLSA, we aim to provide guidance to websites, media organizations and all content producers facing censorship in digital media on methods of coping with censorship, offering them legal consultancy, tools to avoid censorship and a set of internet services that would ease their efforts within the scope of the Free Web Turkey project, which we have been conducting in the field of internet freedom for a year. Besides, we bring together groups working in the field of digital freedoms and freedom of expression to organize panels, roundtable discussions, publish articles, and conduct training programs for content producers to raise awareness against censorship. Another goal of our project is to organize the network of communication and solidarity between institutions, which is one of the most essential components in combating digital censorship. To this end, we try to keep an up-to- date list of blocked URLs and create a database so that we can run a joint and more powerful campaign against censorship. While doing all these, we aim to protect the freedom of expression in the law, the Constitution and international conventions, and to exercise this right effectively.
    [Show full text]
  • Internet Censorship in Turkey: University Students' Opinions
    World Journal on Educational Technology 1 (2009) 46‐56 www.world‐education‐center.org/index.php/wjet Internet censorship in Turkey: University students' opinions * Hasan Ozkan a , Arda Arikan b a Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey b Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey Received April 30, 2009; revised May 31, 2009; accepted June 22 , 2009 Abstract The aim of this paper is to study university students’ opinions toward online censorship with references to their socio‐ political and economic variables. Considering the upwards trend and the increasing number of online restrictions in Turkey, the opinions of university students (n=138) are thought to give significant findings. The questionnaire aimed to collect data on some chosen aspects of censorship which are internet access regulation by legal authorities, online pornographic content, websites distributing illegal and crime related information and the political and religious aspects of the internet censorship. The findings about these four basic aspects toward the online censorship revealed that despite the high proportion of approval, participants have a confused and inconsistent attitude towards the issue especially within the application and the idea of censorship. In a broader aspect, the findings can be interpreted as a sign of university students’ insufficient knowledge and understanding towards the current situation and the possible future of online censorship in Turkey. Keywords: Internet; censor; censorship;
    [Show full text]
  • FOTN 2011 Summary Findings.Pdf
    010101010100010010101010101010101 010100111001010110010101010100010 010101010101010101010100111001010 110010101010100010010101010101010 101010100111001010110010101010100Freedom 010010101010101010101010100111001on the Net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lobal Assessment of Internet and Digital Media Sanja Kelly Sarah Cook EDITORS April 18, 2011 REEDOM OUSE Freedom on the Net 2011 1 F H NEW TECHNOLOGIES, INNOVATIVE REPRESSION: Growing Threats to Internet Freedom By Sanja Kelly and Sarah Cook Over the past decade, and particularly in the last few years, the influence of the internet as a means to spread information and challenge government-imposed media controls
    [Show full text]
  • Declining Journalism Freedom in Turkey
    The University of Maine DigitalCommons@UMaine Honors College Spring 5-2018 Declining Journalism Freedom in Turkey Aliya Uteuova University of Maine, [email protected] Follow this and additional works at: https://digitalcommons.library.umaine.edu/honors Part of the Journalism Studies Commons, and the Political Science Commons Recommended Citation Uteuova, Aliya, "Declining Journalism Freedom in Turkey" (2018). Honors College. 464. https://digitalcommons.library.umaine.edu/honors/464 This Honors Thesis is brought to you for free and open access by DigitalCommons@UMaine. It has been accepted for inclusion in Honors College by an authorized administrator of DigitalCommons@UMaine. For more information, please contact [email protected]. DECLINING JOURNALISTIC FREEDOM IN TURKEY by Aliya Uteuova A Thesis Submitted in Partial Fulfillment of the Requirements for a Degree with Honors (Political Science and Journalism) The Honors College University of Maine May 2018 Advisory Committee: James W. Warhola, Professor of Political Science, Advisor Paul Holman, Adjunct Professor of Political Science Jordan LaBouff, Associate Professor of Psychology and Honors Holly Schreiber, Assistant Professor of Communication and Journalism Seth Singleton, Adjunct Professor and Libra Professor of International Relations © 2018 Aliya Uteuova All Rights Reserved ABSTRACT Currently, Turkey is the country with the most jailed journalists. According to the Journalists Union of Turkey, 145 journalists and media workers are in prison as of February 2018. In the decades that press freedom was monitored in Turkey, the suppression of press and violations of the free expression rights under the regime of Recep Tayyip Erdogan is unprecedented. Turkey once had a potential of emerging as the first modern democracy in a Muslim majority nation.
    [Show full text]
  • Media Self-Regulation in Turkey.Pdf
    Authors Doğan Akın is a graduate of Ankara University’s Political Science Department. He began his journalistic career at Cumhuriyet daily in 1987 and in 1999 became the news director of Milliyet newspaper. In 2008 he became the publishing director of the Doğan-Burda Magazine Group and founded the group’s first online news portal, Tempo24. In 2009, he founded T24, an online independent newspaper where he is currently editor-in-chief. Suncem Koçer (Assoc. Prof.) is an anthropologist of media and communication and a faculty member at the Faculty of Communication at Kadir Has University. Her research focuses on ethnography of media, political communication, news media, and politics of culture in Turkey and the Middle East. Koçer has also worked as a media producer. She co-produced two documentary films and worked as editor and anchor at İMC TV. She also wrote weekly columns for daily Evrensel. Murat Önok (Asst. Prof.) is an assistant professor at Koç University Law School. He holds a BA degree and Ph.D. from Dokuz Eylül University, Izmir. Önok’s fields of research are criminal law, human rights law and international criminal law. He has also taught public international law and criminology. Önok also currently serves as the Vice-President of the Turkish Press Council. Ceren Sözeri (Assoc. Prof.) is a faculty member at the Communications Department of Galatasaray University. She earned both her bachelor’s and master’s degree from that same university and received her Ph.D. from Marmara University. She writes on issues of 002 political economy of the media, media policies, freedom of the press, ethical issues, as well as discrimination and hate speech in traditional and online media in Turkey.
    [Show full text]
  • Social Media and Democratic Revolution; the Impact of New Forms of Communication Democracy
    City University of New York (CUNY) CUNY Academic Works Dissertations and Theses City College of New York 2014 Social Media and Democratic Revolution; The Impact of New Forms of Communication Democracy Christina Ruby CUNY City College How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/cc_etds_theses/308 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Social Media and Democratic Revolution: The Impact of New Forms of Communication Democracy By: Christina Ruby Graduation Fall, 2014 Advisor: Professor Braveboy-Wagner Submitted in Partial Fulfillment of the Requirements for the Degree of Master of International Affairs at the City College of New York Table of Contents Ch. 1: Introduction…………………………………………………………………….Page 1 Ch. 2: Research Design…………………………………………………………………………..Page 6 Ch. 3: Historical Background: How Revolutions Make Use of Technology….Page 15 Ch. 4: Case Study of the Tunisian Revolution…………………………………………Page 29 Ch. 5: Case Study of the 2011 Egyptian Revolution………………………………..Page 46 Ch. 6: Case Study: How Social Media is Opening the Door to Democratic Changes in China…………………………………………………………………………Page 66 Ch. 7: Conclusion………………………………………………………………...Page 79 2 Abstract Communication has been critical for the success of revolutions throughout history. My intent in this thesis is to support the contention that new media technology has become a vital communication tool for today’s democratic revolutions. I begin my research by studying communications tools and their roles in revolutions throughout history. I then conduct three case studies, examining two nations that played a crucial role in the so-called “Arab Spring” democratic revolutions of 2011, Tunisia where the rebellions began and Egypt, one of the central countries in the Middle East/North Africa.
    [Show full text]
  • Online Censorship in Russia and Turkey – New Social Media Legislation
    FOCUS Human Rights Online Censorship in Russia and Turkey – New Social Media Legislation Barış Altıntaş, Irina Borogan, Dr. Michaela Lissowsky, Zelal Pelin Doğan, Andrei Soldatov ANALYSIS Imprint Publisher Friedrich-Naumann-Stiftung für die Freiheit Truman Haus Karl-Marx-Straße 2 14482 Potsdam-Babelsberg Germany /freiheit.org /FriedrichNaumannStiftungFreiheit /FNFreiheit Authors Barış Altıntaş, Irina Borogan, Dr. Michaela Lissowsky, Zelal Pelin Doğan, Andrei Soldatov Editor Global Themes Unit International Department Contact Phone: +49 30 22 01 26 34 Fax: +49 30 69 08 81 02 email: [email protected] Date June 2021 Notes on using this publication This publication is an information offer of the Friedrich Naumann Foundation for Freedom. It is available free of charge and not intended for sale. It may not be used by parties or election workers for the purpose of election advertising during election campaigns (federal, state or local government elections, or European Parliament elections). FOCUS HUMAN RIGHTS 3 Table of contents 1. Introduction _______________________________________________________________________ 4 2. Current situation in Russia ________________________________________________________ 4 Last space for debate _________________________________________________________________ 5 3. Current situation in Turkey ________________________________________________________ 5 The “Censorship Law” No. 7253 _______________________________________________________ 6 Compliance of social media companies with the law __________________________________
    [Show full text]
  • Caught in the Wheels of Power: the Political Legal And
    TESEV DEMOCRATIZATION Program Medıa studıes serıes - 3 Caught in the Wheels of Power: The Political, Legal and Economic Constraints on Independent Media and Freedom of the Press in Turkey Caught in the Wheels of Power Dilek Kurban - Ceren Sözeri Authors Dilek Kurban Ceren Sözeri Bankalar Caddesi Minerva Han, No:2, Kat: 3 34420 Karaköy ‹stanbul T +90 212 292 89 03 F +90 212 292 90 46 DEMOCRATIZATION www.tesev.org.tr ISBN:978-605-5332-18-1 PROGRAM Caught in the Wheels of Power: The Political, Legal and Economic Constraints on Independent Media and Freedom of the Press in Turkey Authors: Dilek Kurban Ceren Sözeri Caught in the wheels of power: The Political, Legal and Economic Constraints on Independent Media and Freedom of the Press in Turkey Türkiye Ekonomik ve Bankalar Cad. Minerva Han Sosyal Etüdler Vakf› No: 2 Kat: 3 Turkish Economic and Karaköy 34420, İstanbul Social Studies Foundation Tel: +90 212 292 89 03 PBX Fax: +90 212 292 90 46 Demokratikleşme Program› [email protected] Democratization Program www.tesev.org.tr Authors: Publication Identity Design: Rauf Kösemen, Myra Dilek Kurban Cover Design: Banu Yılmaz Ocak, Myra Ceren Sözeri Page Layout: Gülderen Rençber Erbaş, Myra Coordination: Sibel Doğan, Myra Prepared for Publication by: Production Coordination: Nergis Korkmaz, Myra Levent Pişkin Printing Organization: Artpres Matbaacılık San. Tic. Ltd. Şti Printed by: Scala Basım, Yayım, Tanıtım San. ve Tic. Ltd. Şti. Yeşilce Mah. Girne Cad. Dalgıç Sk. No:3 4.Levent/İstanbul-Türkiye Tel: 0212 2816200 pbx Copies: 500 TESEV PUBLICATIONS ISBN 978-605-5332-18-1 Copyright © June 2012 All rights reserved.
    [Show full text]
  • International Annual Report 2019
    International Annual Report 2019 Defending Freedom of Expression and Information around the World Economic inequalities continue to gape, discrimination continues unchecked, technology companies continue to hold extraordinary levels of power, and our environment continues to be degraded in the name of economic growth. Our need to know and understand, to refuse and to protest, are more urgent than ever – in this moment of history, the price of silence is higher than any of us can afford.” The Global Expression Report 2018/2019 Indigenous women take part in a protest against right-wing President Bolsonaro's environmental policies and the loss of their traditional settlements. Bolsonaro wants to make greater economic use of the Amazon region in particular and allow further deforestation. 13 August 2019, Brazil. (Photo: Tuane Fernandes/dpa) Contents Civic Space Digital Media Protection Transparency 6 From the Executive 30 #FreeToProtest 35 #SpeakingUp About Tech- 41 Social Media Councils: 47 Uniting for Protection: The 54 The World is Watching: Director: Quinn McKew /#LivreParaProtestar related VAW Protecting Freedom of Power of Coalitions Global Review of the RTI Expression in the “Online 7 From the Chair of 32 Unprecedented Progress 37 “Brazil’s GDPR” Finally 49 Solidarity with Journalists 55 Defending the Defenders in Public Square” the Board: Paddy on LGBTQI+ “Hate Speech” Passed in Turkey Latin America Coulter in Belarus 43 Media Plurality in Mexico 38 Punitive and Damaging: 50 “Offence Against Honour” 56 Kenya Sets a High Bar for 8
    [Show full text]